BRAINWASHING Edgar H. Schein C/6O-16

Total Page:16

File Type:pdf, Size:1020Kb

BRAINWASHING Edgar H. Schein C/6O-16 BRAINWASHING Edgar H. Schein c/6o-16 BRAINWASHING Edgar H. Schein Center for International Studies Massachusetts Institute of Technology Cambridge, Massachusetts 3 CE6/6es e / 6 0. BRAINWASHING Edgar H. Schein Brainwashing is a colloquial term which has been used in reference to the systematic efforts of the Chinese Communists (and by implication the Soviets) to persuade non-believers to accept Communist allegiance, commands, and/or doc- trine by coercive means. More generally, the term has been applied to any technique designed to manipulate human thought or action against the desire, will, or knowledge of the individual. The word brainwashing derives from the Chinese phrase Hsi Nao (Hunter, 1951) and is most appropriately used in refer- ence to Chinese Communist "thought reform" or "ideological remolding" (Szu Hsing Kao Tsao), a program of political indoctrination based on the conception that people who have not been educated in a Communist society have, by defini- tion, incorrect bourgeois attitudes and beliefs, and must therefore be re- educated before they can take their place in a Communist society (Lifton, 1956). Interest in brainwashing on the part of Western observers and scientists derives from the seemingly successful attempts by the Sovit and Chinese Communist secret police and army to convert Western military and civilian prisoners. Of equal interest, however, has been the seeming success of the Soviet secret police in getting confessions from former high officials of the Communist party as in the purge trials of the 1930's (Leites & Bernaut, 1954); and of the Chinese Com- munists in indoctrinating their entire population in the remarkably short time of 3 to 5 years. Because of the close connections between Chinese and Soviet Communism and because of the importance which Soviet psychology seems to attach to the works * Much of the material in this review is from a forthcoming publication, Coercive Persuasion (Schein, 1961). I wish to thank Inge Schneier and Curtis Barker who were my collaborators in preparing that volume and who therefore contributed importantly to this paper. This material was prepared for the 1961 World Affairs Yearbook and will appear there in slightly condensed form. 2. of Pavlov, the assumption has frequently been made that brainwashing is a highly refined adaptation of Pavlovian psychology. From this assumption and the image of scientific mental destruction which it stimulates has come the conception that brainwashing is a highly dangerous and possibly irresistible weapon against the mind of man. Studies of Chinese Communist and Soviet methods of confession extraction and indoctrination have shown that they do have some common roots in the secret police methods of the pre-Communist autocracies in both countries and that both are heavily influenced by basic principles of Party organization, but also that they diverge in important respects from each other, and that the common connec- tions to Pavlovian psychology are very doubtful (Kinkle & Wolff, 1956; Lifton, 1956; Bauer, 1957; Schein, 1959). Where the Soviets have put emphasis on con- fession extraction to justify public trials prior to eliminating the victim, the Chinese have from the beginning emphasized the role of confession extraction as only one step in the rehabilitation and reform of the prisoner; where the Soviets have traditionally isolated the prisoner and undermined his resistance by depriving him of any social contact, the crux of the Chinese approach has been to immerse the prisoner in a small group of other prisoners who are as or more advanced in their reform than he; where Soviet methods have suggested scientific and Machiavellian approaches to interrogation and confession extrac- tion, the Chinese methods have suggested the image of a zealous enthusiastic mass movement sweeping converts into its ranks by virtue of its intrinsic * There is some evidence that Pavlov was especially revered during Stalin's later years because of Stalin's personal desires to advance Pavlovian psychology, but that following Stalin's death there has been a steady decline of interest in Pavlov among Soviet psychologists. However, they often find it expedient to translate work which has only remote connections to Pavlovian psychology into Pavlovian terminology or to preface their work with praise of Pavlov, thus giving the impression of a steady monolithic growth of Pavlovianism (Tucker, 1956; Mintz, 1958). 3. message and reliance on practical knowledge of interpersonal manipulation. Because the Chinese methods, best described by the label "coercive persua- sion," are relatively less known and because the term "brainwashing" applies most appropriately to them, the remainder of this paper will concern itself with reviewing some of the salient findings about Chinese handling of captive groups -- the history of their methods, the actual methods employed, the kinds of target groups involved, the degree of success of the effort, and some attempt to explain theoretically why some Westerners were influenced. The Persuasion Theme in the Development of the Chinese Communist Party It is the attempt to reform its enemies and prisoners -- to cure the disease and save the man -- which distinguishes the Chinese Communist Party (CCP) from other Communist parties. This emphasis on persuasion, rehabilitation, and re- form can be related to a number of features in CCP history. Mao's Peasant Base of Support. Because of the absence of a powerful urban proletariat, Mao, as early as 1925, began to organize a revolution based on peasant support. Although a revolution based on peasant origins had been con- sidered by Lenin, it was a major premise of Marxist ideology that proper class consciousness could only be found in the urban proletariat; peasant origins should lead to the antithesis of the desired Communist attitude because of assumed conservatism deriving from the close ties of the peasant to the land. In organizing peasants, therefore, Mao was led to a "total inversion of certain Marxist pre-suppositions. Instead of deducing ideological tendencies from class affiliations, they (the CCP leadership) decided to deduce class affiliations from ideological tendencies." (Brandt, Schwartz, and Fairbank, 1952). If, through the use of specific ideological appeals such as the fanning of the grievances of the peasant toward his landlords, one could persuade the peasant to the acceptance of Communist premises, the peasant would by definition become a Communist regard- less of actual social origins. Mao's success in organizing peasants proved the correctness of the assump- tion that Communist premises could be learned, an assumption which was of course strongly supported by the experiences of the leaders themselves, most of whom did not qualify by social origin as members of the proletariat (Mao's own origin was on a farm in the province of Hunan). The assumption that even persons with incorrect social origins could learn the Communist ideology, and, on the other hand, that even persons with correct social origins could unlearn what presumably their class status had bestowed upon them, is, of course, at the heart of the Chinest Communist preoccupation with re-education and reform. Replenishing Manpower During the Civil War. The recruitment of converts from initiall y hostile groups was necessary for the CCP's survival and to this end the CCP developed increasingly effective means of coercive persuasion. From Kuomintang (KMT) defectors, prisoners of war, and uneducated rural or urban youth the CCP was able to build up an effectively indoctrinated Red Army and party organization. By treating prisoners lenie tly and emphasizing to them that leniency would continue so long as they were willing to re-educate themselves, the CCP was able to obtain many genuine converts to Communism. The CCP would emphasize that the prisoner was only misguided and that his bourgeois background would not be held against him if he was prepared to confess, accept the "truth" about his criminal past, and learn the truth about the ultimate path to peace and prosperity through Communism. The Exigencies of_ Guerrilla Warfare. The blockade strategy of the KlAT in the early 1930's and of the Japanese in the 1940's forced the Red Army to become primarily a guerrilla operation using hit-and-run tactics. The very nature of 5. these operations required extensive decentralization of administration authority, a wide scattering of forces, and total dependence for basic supplies of food on the local peasantry. "If the masses in any area disliked Communist policy enough to stop giving active support to the local Communist army, that army would be defeated." (Lindsay, 1950, p. 25). To insure active support, the Communists had to rely on persuasion and on constant adaptation of Marxist-Leninist ideology to the local situation. Because of extensive decentralization, even the rank-and-file had to have an adequate working knowledge of Communism and had to learn how to persuade others to it. The growing number of "experts" in the arts of persuasion, of course, proved to be crucial after the take-over when mass indoctrination of the Chinest population became possible. Education in "Liberated" Areas and Coalition Government. The CCP found itself in control of areas of China early in its history, providing the opportunity for the initiation of programs of literacy training and "cultural" education. Such programs made possible effective political tutelage through devices such as teach- ing initially those characters which would make possible the reading of Communist slogans, fanning areas of discontent with the old system, introducing into educa- tion the rudiments of Communist ideology, and so on. Such efforts were partly designed to insure Communist victories at the polls if control by force had to be relinquished. In order to aid the defeat of the Japanese and to build the strength of the CCP, Mao chose to enter into a coalition government with the KMT and to adopt a "united front" strategy. Having committed himself to sharing control with other parties, he could not rely on coercion to insure that his party would remain in control.
Recommended publications
  • Brainwashing As a Strategy for Building Uniformity Reflected in Lois Lowry’S the Giver Novel (1993) Muhammadiyah University of Surakarta
    BRAINWASHING AS A STRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S THE GIVER NOVEL (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA PUBLICATION ARTICLE Submitted as a Partial Fulfillment of the Requirements for Getting Bachelor Degree of Education in English Department By: NUR HANDINI YUSNA LAILY A320120130 ENGLISH DEPARTMENT SCHOOL OF TEACHER TRAINING AND EDUCATION MUHAMMADIYAH UNIVERSITY OF SURAKARTA 2016 0 BRAINWASHING AS A SRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S NOVEL THE GIVER (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA Nur Handini Yusna Laily . A320120130 ABSTRAK BRAINWASHING AS A SRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S NOVEL THE GIVER (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA Nur Handini Yusna Laily . A320120130 ABSTRAK Penelitian ini menganalisis tentang The Influence of Brainwashing as a Strategy for Building Uniformity The Giver (1993) yang dianalisis dengan menggunakan pendekatan sosiologi. Objektif dari penelitian ini adalah untuk mengetahui karakteristik dari brainwashing, untuk mendeskripsikan proses brainwashing dan untuk mengetahui bagaimana Louis Lowry menerapkan brainwashing berdasarkan pendekatan sosiologi. Penelitian ini adalah penelitian kualitatif. Data pada primer penelitian ini adalah The Giver by Lois Lowry’s (1993), dan data sekundernya adalah sumber lain yang berhubungan dengan penelitian yang diambil dari buku sastra, kritik sastra, jurnal, dan beberapa artikel yang berhubungan dengan novel. Hasil penelitian ini adalah pertama, terdapat karakterisitik brainwashing dalam novel The Giver yaitu metode reward dan punishment, obat-obatan dan senyawa lainnnya, pendekatan dalam pidato atau presentasi dan pendekatan secara audio (vocal) dan visual. Dalam pemberian reward dan punishment seperti pemberian pekerjaan pada masing-masing anggota dan juga pemberian aturan dalam komunitas. Sedangkan obat-obatan diberikan kepada komunitas setiap hari.
    [Show full text]
  • The Search for the "Manchurian Candidate" the Cia and Mind Control
    THE SEARCH FOR THE "MANCHURIAN CANDIDATE" THE CIA AND MIND CONTROL John Marks Allen Lane Allen Lane Penguin Books Ltd 17 Grosvenor Gardens London SW1 OBD First published in the U.S.A. by Times Books, a division of Quadrangle/The New York Times Book Co., Inc., and simultaneously in Canada by Fitzhenry & Whiteside Ltd, 1979 First published in Great Britain by Allen Lane 1979 Copyright <£> John Marks, 1979 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner ISBN 07139 12790 jj Printed in Great Britain by f Thomson Litho Ltd, East Kilbride, Scotland J For Barbara and Daniel AUTHOR'S NOTE This book has grown out of the 16,000 pages of documents that the CIA released to me under the Freedom of Information Act. Without these documents, the best investigative reporting in the world could not have produced a book, and the secrets of CIA mind-control work would have remained buried forever, as the men who knew them had always intended. From the documentary base, I was able to expand my knowledge through interviews and readings in the behavioral sciences. Neverthe- less, the final result is not the whole story of the CIA's attack on the mind. Only a few insiders could have written that, and they choose to remain silent. I have done the best I can to make the book as accurate as possible, but I have been hampered by the refusal of most of the principal characters to be interviewed and by the CIA's destruction in 1973 of many of the key docu- ments.
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan
    Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan By: A Joint Report from: Nick Monaco Institute for the Future’s Digital Intelligence Lab Melanie Smith Graphika Amy Studdart The International Republican Institute 08 / 2020 Acknowledgments The authors and organizations who produced this report are deeply grateful to our partners in Taiwan, who generously provided time and insights to help this project come to fruition. This report was only possible due to the incredible dedication of the civil society and academic community in Taiwan, which should inspire any democracy looking to protect itself from malign actors. Members of this community For their assistance in several include but are not limited to: aspects of this report the authors also thank: All Interview Subjects g0v.tw Projects Gary Schmitt 0archive Marina Gorbis Cofacts Nate Teblunthuis DoubleThink Lab Sylvie Liaw Taiwan FactCheck Center Sam Woolley The Reporter Katie Joseff Taiwan Foundation for Democracy Camille François Global Taiwan Institute Daniel Twining National Chengchi University Election Johanna Kao Study Center David Shullman Prospect Foundation Adam King Chris Olsen Hsieh Yauling The Dragon’s Digital Fingerprint: Tracing Chinese Disinformation in Taiwan 2 Graphika is the network Institute for the Future’s The International Republican analysis firm that empowers (IFTF) Digital Intelligence Lab Institute (IRI) is one of the Fortune 500 companies, (DigIntel) is a social scientific world’s leading international Silicon Valley, human rights research entity conducting democracy development organizations, and universities work on the most pressing organizations. The nonpartisan, to navigate the cybersocial issues at the intersection of nongovernmental institute terrain. With rigorous and technology and society.
    [Show full text]
  • Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS
    Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS Executive Summary ....................................................... 1 What Techniques Do Media Manipulators Use? ....... 33 Understanding Media Manipulation ............................ 2 Participatory Culture ........................................... 33 Who is Manipulating the Media? ................................. 4 Networks ............................................................. 34 Internet Trolls ......................................................... 4 Memes ................................................................. 35 Gamergaters .......................................................... 7 Bots ...................................................................... 36 Hate Groups and Ideologues ............................... 9 Strategic Amplification and Framing ................. 38 The Alt-Right ................................................... 9 Why is the Media Vulnerable? .................................... 40 The Manosphere .......................................... 13 Lack of Trust in Media ......................................... 40 Conspiracy Theorists ........................................... 17 Decline of Local News ........................................ 41 Influencers............................................................ 20 The Attention Economy ...................................... 42 Hyper-Partisan News Outlets ............................. 21 What are the Outcomes? ..........................................
    [Show full text]
  • Breaking Through with a Loved One Hooked On
    Countering the Effects of Fear-Based Media: A HearYourselfThink Guide OUR MISSION: ABOUT THIS GUIDE: The HearYourselfThink Project is a 501c3 non-profit, grassroots Right-wing media uses fear to hook its audience and build organization working to provide the insights, tools, and allegiance to their ideological worldview. It also normalizes the strategies needed to counter the toxic and divisive influence of bullying style of high-profile pundits like Bill O’Reilly and Rush right-wing media in our relationships, politics, and culture. Limbaugh, sending the message that it’s not only okay to shout down and intimidate those who disagree with you, but a sign of HearYourselfThink is the brainchild of Erin and Dave Ninehouser, the righteousness of your position and strength of your a husband-and-wife team dedicated to helping undo the damage convictions. The effect of these dynamics isn’t confined to caused by manipulative media sources that misinform and “politics” -- it infects, and can sometimes destroy once-strong inflame Americans and to bend the cultural-curve back toward friendships and weaken the ties between family members. reason, critical thinking, and “a more perfect union” as opposed to ever-more polarized citizens. Rebuilding those ties and re-establishing those valuable relationships is part of the deprogramming process, and a Erin and Dave have combined their years of grassroots necessary first step to having a long-term conversation about organizing experience (talking with tens of thousands of voters media manipulation and the dangers of political polarization. and seeing firsthand how the “The Fox Effect” poisons the That’s why this guide addresses family dynamics and provides national discourse with fear, misinformation, and conspiracy) ideas to help you put together a plan to begin repairing and research on how the brain’s processing of strong emotion relationships that have suffered under the strain of divisive right- like fear and anger affects higher thinking, to develop a wing media.
    [Show full text]
  • Psychological Warfare and Propaganda in World War Ii: Air Dropped and Shelled Leaflets and Periodicals
    http://gdc.gale.com/archivesunbound/ PSYCHOLOGICAL WARFARE AND PROPAGANDA IN WORLD WAR II: AIR DROPPED AND SHELLED LEAFLETS AND PERIODICALS This publication collection consists of over 1,000 air dropped and shelled leaflets and periodicals created and disseminated during the Second World War. The majority of items in this collection were printed by the Allies then air or container dropped, or fired by artillery shell over German occupied territory. Many leaflets and periodicals have original publication codes and were printed in over 10 languages. Only shelled leaflets, Germans to Allies (115 items), are in English. Date Range: 1939-1945 (predominantly 1942-1945) Content: 9,730 images Source Library: McMaster University Library Detailed Description: Following World War I, many Americans believed that the U.S. was pressured into WWI by false, manipulative propaganda laced with lies from both the British and the Germans. However, as J.A.C. Brown, noted psychiatrist and author of Techniques of Persuasion: From Propaganda to Brainwashing, articulated, "propaganda is successful only when directed at those who are willing to listen, absorb the information, and if possible act on it, and this happens only when the other side is in a condition of lowered morale and is already losing the campaign". Therefore, the use of airborne leaflets was a way for World War II enemies to psychologically attack one another in a different way than in previous wars. Distribution of Airborne leaflet propaganda was used by both allied and Axis forces in the Second World War. Airborne leaflets printed during WWII were "factual, in the main truthful, and served to create a reputation for reliability both in supplying information and refuting German accounts which we said to be untruthful".
    [Show full text]
  • Child Sex Rings: a Behavioral Analysis for Criminal Justice Professionals Handling Cases of Child Sexual ~ Exploitation
    If you have issues viewing or accessing this file contact us at NCJRS.gov. NATIONAL CENTER FOR MISt.f9IN(. 1~"I"j('lrl'l~I) -----1.---' CHI L D R E N Child Sex Rings: A Behavioral Analysis For Criminal Justice Professionals Handling Cases of Child Sexual ~ Exploitation In cooperation with the Federal Bureau of Investigation ------------------ 149214 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been grantedNaElona1 by • center f'or Mlsslng . & Exploited Chi1dren/DOJ/FBI to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. Child Sex Rings: A Behavioral Analysis For Criminal Justice Professionals Handling Cases of Child Sexual Exploitation April 1992 Second Edition Kenneth V. Lanning Supervisory Special Agent Behavioral Science Unit Federal Bureau of Investigation FBI Academy Quantico, Virginia © National Center for Missing & Exploited Children Dedication This book is dedicated to the victims of child sex rings and to the memory of two FBI agents who devoted their professional lives to helping sexually exploited children. Leo E. Brunnick FBI Boston, Massachusetts Alan V. MacDonald FBI Boston, Massachusetts Contents Author's Preface v 1. Historical Overview 1 "Stranger Danger" 1 Intrafamilial Child Sexual Abuse 2 Return to "Stranger Danger" 2 The Acquaintance Molester 3 Satanism: A "New" Form of "Stranger Danger" 3 2.
    [Show full text]
  • Parental Alienation Syndrome and Parental Alienation: Research Reviews
    Applied Research Forum National Online Resource Center on Violence Against Women Parental Alienation Syndrome and Parental Alienation: Research Reviews By Joan S. Meier1 Parental alienation syndrome (PAS) and parental alienation,” but focuses instead on children’s “align- alienation (PA) are often invoked in legal and ment” with one parent against the other. legislative contexts addressing the rights of fathers Beginning in the early 1980’s, attention to a and mothers in custody or visitation litigation. purported “parental alienation syndrome” exploded Indeed, alienation claims have become ubiquitous in as the result of the dedicated efforts of Richard custody cases where domestic violence or child Gardner, a psychiatrist loosely affiliated with abuse is alleged as grounds to reject mothers’ Columbia Medical School2 who ran a clinical requests to limit paternal access to their children. practice that focused on counseling divorcing This paper provides a historical and research over- parents. Based solely on his interpretation of data view of PAS and PA, identifies strategic issues for gathered from his clinical practice, Gardner posited advocates working with abused women and chil- that child sexual abuse allegations were rampant in dren, and offers guidelines to improve courts’ custody litigation and that 90% of children in cus- treatment of these issues. While PAS and PA have tody litigation suffered from a disorder, which he much in common both as theories and with respect called “Parental Alienation Syndrome (PAS).” He to how they are used in court, they have distinct described PAS as a “syndrome” whereby vengeful scientific and research bases and critiques. This mothers employed child abuse allegations as a paper, therefore, addresses them separately.
    [Show full text]
  • What Is Coercive Control? Coercive Control Is a Term Developed by Professor Evan Stark to Help Us Understand Domestic Abuse As More Than a “Fight”
    CCChat The online magazine on and araroundound ccoeroercivcivee cconontrtrolol SPECIAL EDITION Understanding Coercive Control The Continuum Of Coercive Control red flags trauma bonding entitlement covert abuse CONTENTS EDITORIAL COVERT ABUSE page 05 page 10 COERCIVE CONTROL RED FLAGS page 07 page 16 - 00 - CONTENTS ENTITLEMENT BOOK OF THE MONTH page 20 page 32 THE CONTINUUM OF CC READING LIST page 26 page 33 TRAUMA BONDING FREEDOM PROGRAMME page 29 page 38 - 00 - about the editor Min Grob editor To contact Min email: [email protected] Min has been raising awareness of coercive control since 2015, having both left a relationship, and narrowly avoided selling the family home, in exchange for an isolated smallholding in a foreign country, far away from everyone. Realising that non-violent abuse is mostly invisible in plain sight, she set about organising the world’s first conference on coercive control. To date conferences have been held in Bury St Edmunds, Bristol, London and Liverpool. In 2017, Min started CCChat, a free online magazine to further increase understanding and give a voice to survivors who have not been heard. To date,the online version of CCChat has been read over 44,000 times. This special edition is the first in a series, exploring the complexities of understanding, identifying and evidencing coercive control in more depth. - 00 - - 00 - CCChat Special Edition Understanding Coercive Control What is Coercive Control? Coercive control is a term developed by Professor Evan Stark to help us understand domestic abuse as more than a “fight”. Coercive control is a pattern of behaviour Much coercive control which seeks to take away a victim’s freedom, their sense of self and erode away their self- is hidden from view esteem.
    [Show full text]
  • The Color of Brainwashing: the Manchurian Candidate and the Cultural Logic of Cold War Paranoia
    【연구논문】 The Color of Brainwashing: The Manchurian Candidate and the Cultural Logic of Cold War Paranoia Swan Kim (University of Virginia) [T]he shock of the discovery of the plight of the prisoners placed Chinese conduct in a new, infinitely more disturbing light. Mao Tse Tung’s China acquired a new, far more frightening and disturbing aspect. From this, arguably, its image in the West never recovered. Long after the Korean War receded into memory, the fear of “the Manchurian candidate” remained. Max Hastings, The Korean War (1987, 304) The concept of a rumor does not deny the presence of existential threats facing the United States during the course of the Cold War. In fact, the predominant image of the enemy was, at times, quite realistic. Nevertheless, veracity had little to do with the rumor’s reception. The rumor spread because it provided a culturally compelling explanation for an uncertain predicament; fact and accuracy played a supporting role only. The sinister face of the enemy emerged primarily from a common “universe of discourse” and a pool of “shared assumptions” permeating American society at mid-century. Ron Robin, The Making of the Cold War Enemy (2001, 4) 168 Swan Kim The Korean War brought one of the great sea changes in postwar American history, yet the most mysterious and terrifying outcome for the American public was a psychological one: “[o]ne of the most interesting aftermaths of the Korean conflict in 1950-1953 has been the preoccupation of many Americans with ‘brainwashing.’”1) As the ultimate product of Cold War paranoia, brainwashing was considered the latest weapon that would complement an ideological warfare.
    [Show full text]
  • Title IX Safety and Security Report
    2021 Heritage Valley Kennedy School of Nursing Annual Safety and Security Report Title IX (A review of 2020) Valerie Gaydosh Heritage Valley Kennedy 1/1/2021 I. Introduction ........................................................................................................................................... 2 Campus Safety and Security / Cleary Act Title IX II. The Campus: Heritage Valley Kennedy School of Nursing ................................................................... 2 III. Campus Safety and Security / Cleary Act and Title IX Personnel ......................................................... 3 IV. Reporting Occurrences /Emergency Alert System ................................................................................. 4 V. Fire Safety .............................................................................................................................................. 6 VI. Title IX Coordinator ............................................................................................................................... 6 VII. School and Governing Agency Policies ................................................................................................. 6 Ohio Valley Hospital .............................................................................................................................. 6 A. Emergency Plan: Incident Command ............................................................................................. 6 1. Evacuation 2. External Evacuation B. Fire, School of Nursing –
    [Show full text]